Golioth Firmware SDK version 0.10.0 prior to 0.22.0, fixed in commit d7f55b38, contain an out-of-bounds read in LightDB State string parsing. When processing a string payload, a payloadsize value less than 2 can cause a sizet underflow when computing the number of bytes to copy (nbytes). The subsequent memcpy() reads past the end of the network buffer, which can crash the device. The condition is reachable from onpayload, and goliothpayloadisnull() does not block payload_size==1. A malicious server or MITM can trigger a denial of service.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23748.json"
[
{
"digest": {
"line_hashes": [
"270491787148285070387330187905151400246",
"195132740043648741634691365970305938567",
"265329507019446736592808368929759304553"
],
"threshold": 0.9
},
"id": "CVE-2026-23748-b1e850b9",
"source": "https://github.com/golioth/golioth-firmware-sdk/commit/d7f55b380d8be8b29bd101ce06e421af2e88c12b",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/lightdb_state.c"
},
"signature_type": "Line"
},
{
"digest": {
"length": 1186.0,
"function_hash": "304645336577916009732044048905621108770"
},
"id": "CVE-2026-23748-fa2daa08",
"source": "https://github.com/golioth/golioth-firmware-sdk/commit/d7f55b380d8be8b29bd101ce06e421af2e88c12b",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/lightdb_state.c",
"function": "on_payload"
},
"signature_type": "Function"
}
]